Security Posture Assessment Scope of Work

Topics: Computer security, Security, Information security Pages: 4 (783 words) Published: July 5, 2011
The first step in securing your network is to identify the vulnerability and the risk associate with it. Risk Treatment Plan is based on overall security framework and based on the risk and vulnerability assessment. Risk Treatment is a process of selection and implementation of measures to mitigate risks identified earlier. We shall help your COMPANY in deciding the approach that it would take to manage the vulnerability and determine the degree of risk that it is prepared to accept. We shall assist technical team in formulating an effective vulnerability mitigation and resolution to address the vulnerabilities associated with the assets of the organization. This would be done by recommending industry best practice controls and establishing procedures for your company to mitigate these risks. The vulnerability assessment activity will address the security of different layers of technology according to the following diagram. There are several technology elements which will address more than one layer.

Example of Technology Element


Network Security


AAA Dialup Access
Fire detection
& Protection
Control Power Air
Cabling (UPS, Management)

To be specific below are descriptions of scope to be implemented during SPA Services.

3.1 Network Architecture Review

We will perform activity such as;
Maps current network infrastructure implementation against document architecture •Review network security parameter configuration and setup such firewall, Intrusion Prevention/Detection System, Load Balancer, VPN Gateway. •Review network equipment configuration and setup such as router and switch. •Review VLAN setup and configuration

Scan selected one user VLAN segment for any malicious activity and configuration. •Spoof selected VLAN segment to monitor traffic in the network.

3.2ICT Security Physical Assessment
Security assessment normally been ignored by...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Scope Of Work Essay
  • Scope of Work Essay
  • Essay on Security Assessment
  • Security Assessment Essay
  • Warehouse Security Assessment Essay
  • work Essay
  • Essay on Assessment in social work
  • Introduction to Information Security: Assessment Worksheet Essay

Become a StudyMode Member

Sign Up - It's Free